65,032 research outputs found

    Simulasi Kunci Elektronik dengan Enkripsi melalui Bluetooth pada Ponsel

    Full text link
    Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time. Usually, to open a door key one must use a key, so to access a lot of doors must have a lot of different keys. But if the phone is used as an electronic key access control must implement all the keys are not needed anymore, just with one phone can open many locks. Simulation of an electronic lock is designed to use the phone as a remote control, and the computer as a central controller. Communication between mobile phones and computers using Bluetooth. While functioning as a door lock which is connected via parallel port of computer. This electronic key system to apply Access Control using RC4 encryption and MD5 Hashing. Design modules are built using NetBeans IDE 4.1 and the MySQL database, with some additional libraries. Libraries that are mobility netbeans 4.1, mysql-connector-java-3.0.9, BlueCove, Bluelet-Benhui. Phones that use must support the Java MIDP 2.0 and JSR-82

    Twckenham Converts

    Get PDF
    Bruce Grant-Braham examines the latest hospitality information technology application

    Building distributed heterogeneous smart phone Java applications an evaluation from a development perspective

    Get PDF
    The advances in mobile phone technology have enabled such devices to be programmed to run general-purpose applications using a special edition of the Java programming language. Java is designed to be a heterogeneous programming language targeting different platforms. Such ability when coupled with the provision of high-speed mobile Internet access would open the door for a new breed of distributed mobile applications. This paper explores the capabilities and limitations of this technology and addresses the considerations that must be taken when designing and developing such distributed applications. Our findings are verified by building a test client-server system where the clients in this system are mobile phones behaving as active processing elements not just mere service requesters

    Smart Signs: Showing the way in Smart Surroundings

    Get PDF
    This paper presents a context-aware guidance and messaging system for large buildings and surrounding venues. Smart Signs are a new type of electronic door- and way-sign based on wireless sensor networks. Smart Signs present in-situ personalized guidance and messages, are ubiquitous, and easy to understand. They combine the easiness of use of traditional static signs with the flexibility and reactiveness of navigation systems. The Smart Signs system uses context information such as user’s mobility limitations, the weather, and possible emergency situations to improve guidance and messaging. Minimal infrastructure requirements and a simple deployment tool make it feasible to easily deploy a Smart Signs system on demand. An important design issue of the Smart Signs system is privacy: the system secures communication links, does not track users, allow almost complete anonymous use, and prevent the system to be used as a tool for spying on users

    Exploring Bluetooth based Mobile Phone Interaction with the Hermes Photo Display

    Get PDF
    One of the most promising possibilities for supporting user interaction with public displays is the use of personal mobile phones. Furthermore, by utilising Bluetooth users should have the capability to interact with displays without incurring personal financial connectivity costs. However, despite the relative maturity of Bluetooth as a standard and its widespread adoption in today’s mobile phones, little exploration seems to have taken place in this area - despite its apparent significant potential. This paper describe the findings of an exploratory study nvolving our Hermes Photo Display which has been extended to enable users with a suitable phone to both send and receive pictures over Bluetooth. We present both the technical challenges of working with Bluetooth and, through our user study, we present initial insights into general user acceptability issues and the potential for such a display to facilitate notions of community

    A Cooperative Emergency Navigation Framework using Mobile Cloud Computing

    Full text link
    The use of wireless sensor networks (WSNs) for emergency navigation systems suffer disadvantages such as limited computing capacity, restricted battery power and high likelihood of malfunction due to the harsh physical environment. By making use of the powerful sensing ability of smart phones, this paper presents a cloud-enabled emergency navigation framework to guide evacuees in a coordinated manner and improve the reliability and resilience in both communication and localization. By using social potential fields (SPF), evacuees form clusters during an evacuation process and are directed to egresses with the aid of a Cognitive Packet Networks (CPN) based algorithm. Rather than just rely on the conventional telecommunications infrastructures, we suggest an Ad hoc Cognitive Packet Network (AHCPN) based protocol to prolong the life time of smart phones, that adaptively searches optimal communication routes between portable devices and the egress node that provides access to a cloud server with respect to the remaining battery power of smart phones and the time latency.Comment: This document contains 8 pages and 3 figures and has been accepted by ISCIS 2014 (29th International Symposium on Computer and Information Sciences

    Risks of Offline Verify PIN on Contactless Cards

    Get PDF
    Contactless card payments are being introduced around the world al- lowing customers to use a card to pay for small purchases by simply placing the card onto the Point of Sale terminal. Contactless transactions do not require veri- fication of the cardholder’s PIN. However our research has found the redundant verify PIN functionality is present on the most commonly issued contactless credit and debit cards currently in circulation in the UK. This paper presents a plausible attack scenario which exploits contactless verify PIN to give unlimited attempts to guess the cardholder’s PIN without their knowledge. It also gives experimental data to demonstrate the practical viability of the attack as well as references to support our argument that contactless verify PIN is redundant functionality which compromises the security of payment cards and the cardholder
    corecore